Preview

Lab 2 Performing A Vulnerability Assessment Worksheet

Good Essays
Open Document
Open Document
652 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 2 Performing A Vulnerability Assessment Worksheet
Assessment Worksheet
Performing a Vulnerability Assessment
CSS150-1502A-02 : Introduction to Computer Security
Course Name and Number: _____________________________________________________
Johnathan McMullen
Student Name: ________________________________________________________________
Stephen Osborne
Instructor Name: ______________________________________________________________

Lab Due Date: ________________________________________________________________
Overview
In this lab, you used Nmap commands within the Zenmap application to scan the virtual network and identify the devices on the network and the operating systems and services running on them.
You also used OpenVAS to conduct a vulnerability assessment and record the high risk vulnerabilities identified by the tool. Finally, you used the information you gathered from the report to discover mitigations for those risks and make mitigation recommendations based on your findings.
Lab Assessment Questions & Answers
1. What is Zenmap typically used for? How is it related to Nmap? Describe a scenario in which you would use this type of application.
Zenmap is a graphical interface for Nmap, a port scanning tool that can quickly identify hosts and detect what operating system and services are running on them, and all without privileged access. Zenmap, and similar tools, are typically used during the scanning and vulnerability phase of the ethicalcan hacking process.
2. Which application be used to perform a vulnerability assessment scan in the

reconnaissance phase of the ethical hacking process?
. OpenVAS (Greenbone Security Assistant). Vulnerability assessment tools are typically used to complete the scanning and vulnerability assessmentphase once the network mapping scanis completed 3. What must you obtain before you begin the ethical hacking process or penetration test on a live production network, even before performing the reconnaissance step?
You must obtain written authorization to perform an intrusive,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application.…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap "Network Mapper" is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.…

    • 281 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I would recommend him using Nmap. Nmap is the most popular port scanner. Nmap (“Network Mapper”) is an open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (ports) they are offering, what operating system (and OS version) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers, and…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    interfaces. Finally, you used Zenmap to perform a scan of the network and created a network…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Net Sec

    • 11860 Words
    • 48 Pages

    The syntax for an Intense Scan in Zenmap is as followed: nmap -T4 -A -v -PE -PS22,25,80 -PA21,23,80,3389 172.30.0.0/24…

    • 11860 Words
    • 48 Pages
    Powerful Essays
  • Satisfactory Essays

    Create daily incremental backups of data, and have back up equipment ready to be installed…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    1. What is the application Zenmap GUI typically used for? Describe a scenario in which you would use this type of application.…

    • 464 Words
    • 2 Pages
    Good Essays
  • Good Essays

    4. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24?…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Perform Reconnaissance

    • 299 Words
    • 2 Pages

    4. What is the command line syntax for running an “Intense Scan” with Zenmap on a target subnet of 172.30.0.0/24?…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are two very important tools to use in Networking. They are Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP). These help keep your Network organized while building it. A DNS is a system used to name computers and network services that is organized into a hierarchy of domains. It can help locate computers and services through user names. Dynamic Host Configuration Protocol allows a server to automatically assign IP addresses to a computer from a certain range of numbers configured for that network. These two tools work as the foundation for IT-Management.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    Answer: Computer Name, OS, Security Settings for Windows Firewall, Drives, Running Programs, and Installed Programs and Versions.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Operating systems with networking capability have a fifth essential manager called the Network Manager that provides a convenient way for users to share resources while controlling users’ access to them.…

    • 1262 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Android Wifi Apps

    • 833 Words
    • 4 Pages

    The Android Network Toolkit is an complete tool kit for the pentesters , where hackers can find expolots using the mobile and penetrate or attacks the ip's according to their vunerabilities.…

    • 833 Words
    • 4 Pages
    Good Essays